Collect your special 20th Edition CIO100 Memorabilia
Host Partner
Join Grant ‘Axe’ Rawlinson as he shares his extraordinary journey from Singapore to New Zealand by human power, revealing how boldness and originality—not conformity—drive true leadership. Discover the mindsets, skill sets, and lived experiences that empower CIOs to lead with courage, curiosity, and conviction in an increasingly uncertain world.
Leaders in AI-Native Networking by Juniper Networks
Cloud Data Security Supremos by Netskope
Foundry Global Team, Special Invitees
Zero Trust Mavens by ACPL
Data Security Maestros by Varonis
Building on his expedition story, Axe challenges CIOs to embrace uncertainty as a strategic advantage. In a world where standing still means falling behind, this session explores why stepping into the unknown is not a risk—but a necessity—for relevance, innovation, and growth.
The computer has undergone a timeless journey of miniaturization, from planet-scale mainframes to the pocket-sized device. Yet, the user interface for business software remained stuck in the ’80s, forcing users to navigate complex, fragmented apps. This keynote explores the next great act of miniaturization in enterprise software: the shift from apps to conversational agents.
Industry Speaker, Cybersecurity Expert
As AI adoption accelerates across industries, the volume of raw data generated from edge devices, core infrastructure, and cloud platforms continues to grow at an unprecedented pace. The wide range of sources calls for a more strategic and resilient approach to data protection and management. However, edge environments, which are often where much of the raw data for AI originates, are still one of the most overlooked areas in many protection strategies today.
In this session, Synology will share how organizations can build a cost-effective and scalable data resilience framework that meets the needs of both IT and AI-driven workflows. The presentation will explore how to implement a 3-2-1-1-0 backup strategy, structure infrastructure across hot, warm, and cold data tiers, and ensure end-to-end data availability without compromising integrity or budget.